To the Buttons...

     Encryption   

       

 

 

 

One way of hiding, but we can do better.

 

         Metallic Element : HgMercury, the only metal that is liquid at room temperature. Chemical Symbol Hg : Atomic No. 80; Ar=200.59; Shells: 2,8,18,32,18,2; MP -39C; BP 357C; Main ore is its sulphide, cinnabar.

     

    Encryption , as distinct from  wiping, encodes text, data, or images, yet keeps the material intact, allowing you to decrypt (ie. decode) when you need to access it. You can encrypt files, folders, partitions, or even whole discs.

      There are numerous approaches to this :  the PGP system, requires public and private digital keys, and  is a very powerful implementation of the idea.  It has an option for encrypting whole discs or partitions at a time (5th button under the Table).  Some of the applications in the Table can be configured to appear on the RClick Menu of any File or Folder, Drive or Shortcut. Some will hide the files as well as encrypting them. It is also possible to send encrypted (secure) email messages, and there are web-based applications to do this that require no downloads. You do, however, need to create an account and log in.

                An application with built-in encryption is Power Desk 5 Powerful DT Organizer

      If an  encrypted file is opened in a text editor, such as Notepad , it appears to contain garbage *. Its hidden data is unobtainable without the password. If the actual name is also sensitive you may need to change it manually, either before or after encryption. If you change it afterwards, when unencrypted, the original name (and extenders) will re-appear. 

* Do not attempt to add, change or remove characters inside encrypted files. You will corrupt the data stream and you won't be able to decrypt them.

To the Buttons...
        Table 8                      Encryption Packages

Program / Version

Function

URL

Notes  

Cryptext 3.40

 Cryptext is a public domain Windows shell extension that performs strong file encryption and runs on Windows 95 or later and NT4 or later.  It uses a combination of SHA-1 and RC4 to encrypt files using a 160-bit key, and generates a salt value for each file to ensure that no two files are encrypted with the same keystream.

 Its functions are performed from a RClick Menu option.

ABI Coder 3.6.1

   ABI- CODER is a personal file encrypter that is powerful and easy to use. It allows you to encrypt multiple files in multiple folders by using one of its 3 encryption algorithms. This software also has a self-decrypting file tool, which can create encrypted files, which do not require any decryption software.

ABISoft Unlimited period trialware
EasyCrypto Deluxe 5.5

   Can encrypt both standalone files and entire folders. Uses 128-bit key BlowFish algorithm. You can build self-extracting encrypted and compressed archives and send them to others. The only thing a recipient needs to extract the encrypted files is the correct password.    You can also add several files or entire folders to an encrypted EasyCrypto ZIP file. When you send this type of archive to someone, the recipient just needs to install EasyCrypto to extract the folders. 

ABISoft After encrypting files, EasyCrypto securely and  automatically wipes the  originals.
KPKFile 7.1

This  is a program that provides security for your sensitive files by encrypting and hiding them. It also offers the option of burying the encrypted files within another, such as a Microsoft Word document or a bitmap image. Moreover, KPKFile can create a secret folder (named Private Folder) that's impossible to access without the proper password. It manages an encrypted database of passwords and related data.

   Can hide encrypted files as stand-alone or inside others. Consult the Read Me file for a fuller description of KPK's main functions.

Scram Disk 3.01  

 Scramdisk is a program that allows the creation and use of virtual encrypted drives. Basically, you create a container file on an existing hard drive which is created with a specific password. This container can then be mounted by the Scramdisk software which creates a new drive letter to represent the drive. The virtual drive can then only be accessed with the correct passphrase. 
Once the passphrase has been entered correctly and the drive is mounted the new virtual drive can then be used as a normal drive, files can be saved and retrieved to the drive and you can even install applications on it. 

Not for Windows XP

ScramDisk virtual disks can  be stored in : 
a.   a container file on a FAT hard  disk. 

b. in an empty partition. 

c.  in the low bits of a WAV audio file (ie. steganography). 

Hush Mail 

 HHush Mail is a free Web-based E-mail service, that offers 1024-bit technology encryption for your messages and attachments. ush Mail is a free Web-based E-mail service, that offers 1024-bit technology encryption for your messages and attachments. 

Note :  to take advantage of the 1024-bit encryption feature your recipient must also be a HushMail user. 

Stealth Message 

 Stealth Message gives you email privacy with self-destruct options through your existing address. You choose the level of security, putting control in your hands. There's no software to download and you can access Stealth Message from anywhere, and at anytime through browser.

 Email Privacy with no downloads.
Crypto Anywhere 2.0

Crypto Anywhere is secure and portable email client. It allows you to send secure email messages from anywhere.  The program offers the choice of self-decrypting messages (receiver only needs the password) or public key encryption (receiver needs decryption software). 

Small enough to fit on a single floppy. Support for attachments is included, and there is a  secure friends list (stored keys). No software to install.

 SneakeMail 2.0

 The original disposable email service, created for email users to regain power over their email from commercial forces and catch them spamming. 

Premium  (pay) service upgrade route. 

No ads or commercial ties.

                                               Give 'em a Good Hiding...                                                          

To the Buttons...

    Encryption ProgramsFreebyte Security Kremlin SecurityRSA SecurityPGPFree Site   

Click the buttons to follow  links to other software and  a  comprehensive account of file encryption.